CompTIA A+ (Anki) 3 Flashcards

(100 cards)

1
Q

_ are issued with pre-configured private IP addresses
can login using a browser with default connections
when configuring it, physically connect to the router using a laptop or desktop
-an IP address should be assigned by default similar to same network
-if not given one configure manually to the same network

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enable __
enables devices to automatically announce their presence to other devices on the network
eg. printers

A

Universal Plug and Play

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Configure __

specifies that a particular request coming from the internet should be directed to a specific computer on the network

A

port forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Every device on a network needs an __ to communicate

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Every IP address has 2 sections, they are __

The division between the two is determined by the subnet mask

A

Network ID and Host ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The __ is a value that works in conjuction with the IP address
determines the size of the network or number of hosts that can be accommodated on that network

A

subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The __ is the IP address of the router
Allows the host device to access the internet
Not required if you only want hosts to communicate on the internal network

A

default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IoT

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
\_\_ are the various household devices that will communicate over TCP/IP
thermostat
security system
lights
entertainment system
electronic appliances
vehicles
A

IoT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DSL

A

Digital Subscriber Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RDP uses port

A

3839

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HDD

A

Hard Disk Drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SMB uses port

A

445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SLP uses port

A

427

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

__ utiilize existing phone lines
supplied by ISP using phone jack RJ-11 connector
Computer or router connects to the modem with a standard ethernet cable RJ-45 connector
Does no interfere with phone service as they operate on different frequencies

A

DSL Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
The advantages of \_\_ are
much faster than dial-up
Bandwidth is not shared
Reliable
-Generally as reliable as phone service
A

DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
The disadvantages of {{c1::DSL}} are 
may not be available in certain areas
-rural areas in particular
More hardware may be required
-splitters or filters
More expensive than dial-up
An older building with older wiring may not support DSL Speeds
A

DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

__ uses a cable modem
utilizes existing cable tv lines
supplied by ISP and connects to the cable tv jack (coaxial connector)
Computer or router connects to the modem with a standard ethernet cable (RJ-45 connector)
Does not interfere with cable tv service

A

Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
The advantages of \_\_ are 
generally faster than DSL
-speeds up to 400 Mbps
Does not require the use of a phone or splitter
Reiable
-Generally as reliable as tv service
A

cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The disadvantages of __ are
May not be available in certain rural areas usually rural
more expensive than dial-up
overall bandwitdth is shared with other users in your segment
-advertised speeds not guaranteed
-may slow during peak periods
security
-all users in your segments are on a LAN: possible to see other systems

A

cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

__ protects internal network
Prevent attackers on the internet from accessing your internal resources
Prevent your internal computers from accessing undesirable content on the Internet
Filters packets passing through the firewall based on defined rules

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The two types of __ are network-based and host-based

A

firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

__ firewall
generally a stand-alone network hardware device
desigened to protect the entire network

A

Network-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Configuring a __
Operate based on defined rules
-default deny - blocks all traffic
-default allow - allows all traffic

Rules to override the default state are based on 
IP address
Port number
Domain name 
Any combination of above

Packets that match the criteria of the rule are allowed or blocked, depending on the type of rule

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
__ is If a client on the internal network issues a request over a specific port, the firewall expects traffic to return to that client over the same port creates a temporary rule to allow that traffic in the return direction
Port triggering
26
__ Uses two firewalls to create a separate network between the internal LAN and the Internet Allows for systems that need to be exposed to the internet to be isolated from you LAN Systems in it can be accessed from either direction without exposing other systems in the internal LAN
Demilitarized Zone (DMZ)
27
QoS
Quality of Service
28
__ is a network strategy that allows fo r managment of network traffic to maintain a desired level of performance prioritization of traffic based on which applications or services demand more bandwitdth More common in larger networks -Main 5 issues that are addressed are Delay Dropped packets Errors Jitter Sequence
QoS
29
can address Delay - usually the result of congestion Dropped packets - often results in delay as dropped packets need to be transmitted Errors - usually the result of corrupted packets Jitter - a variation of delays in the packet stream Sequence - packets arriving out of order, affects real-time communications such as VoIP or video conferencing Administrators can set priorities on the type of service to allocate more bandwidth where its needed
QoS
30
is a wireless standard that provides bandwitdth up to 54 Mbps Operates at radio frequencies between 5.725 GHz and 5.850 GHz High frequency make it difficult to penetrate walls and other obstructions Also referred to as "Wi-Fi 2" Commonly found on business networks
802.11a
31
the pros of __ are fast maximum speed regulated frequencies -helps prevent signal interference from other devices
802.11a
32
``` The cons of __ are higher cost than 802.11b -(b) is typically used in home setups shorter signal -easily obstructed ```
802.11a
33
The pros of __ are lower cost compared to 802.11a good signal range not easily obstructed
802.11b
34
The cons of __ are slower maximum speed | unregulated frequency - may interfere with home appliances
802.11b
35
emerged on the market in 2002 comines the best of both 802.11a and 802.11b supports bandwitdth up to 54 Mbps Achieves greater range using 2.4 Ghz frequency backward compatible with 802.11b
802.11g
36
the pros of __ are fast maximum speed good signal range not easily obstructed
802.11g
37
The cons of __ are costs more than 802.11b unregulated frequency - may interfere with appliances
802.11g
38
is also referred to as wireless N Utilizes multiple wireless signals and antennas -improves bandwidth offers better range due to increased signal intensity backward compatible with 802.11b/g
802.11n
39
``` The pros of __ are fastest maximum speed best signal range resilient to signal interference eg. outisde sources ```
802.11n
40
The cons of are costs more than 802.11g may interfere with nearby 802.11b/g-based networks -due to the use of multiple signals
802.11n
41
``` is the latest generation of Wi-fi signaling utilizes dual band wireless technology supports simultaneous connections 2.4 Ghz 5 Ghz Bacwards compatible with 802.11b/g/n on 2.4 Ghz 802.11a on 5 GHz ```
802.11ac
42
``` The pros of __ are improved bandwitdh more flexibility -simultaneous connection support backward compatibility ```
802.11ac
43
The cons of __ are increased cost prone to interference when using 2.4 GHz frequency
802.11ac
44
The pros of __ Ghz are larger coverage area than 5 GHz Can penetrate solid objects eg. walls and floors
2.4
45
the cons of __ GHz are lower data rate susceptible to interference -more devices use the 2.4 GHz frequency
2.4
46
the range of __ GHz is divided up into fourteen channels in total defined for use by Wi-Fi 802.11 depending on the country, not all channels are allowed
2.4
47
__ operates in the 2.4 GHz frequency band across 79 channels common in cell phones and wireless PC and audio equipment ex. headsets speakers keyboards
bluetooth
48
__ devices can send and receive data wirelessly without relying on wifi latest (version 5) has a range of up to 400 meters
bluetooth
49
``` the pros of _ are low power consumption relatively secure versatility (allows for wireless communications between a number of different devices) developer-friendly format ```
bluetooth
50
``` the cons of _ are connections issues devidces can be inconsistent during the pairing process, possible from interference obstructions other transmissions ```
bluetooth
51
``` is a form of contactless communication commonly used in devices such as smartphones tablets User simply waves device over the compatible device to send information range is very limited ```
NFC
52
The pros of _ are convenient seamless (just need to store the data in phone) supported by major vendors devices do not need to be paired (they just need to be within range of each other)
NFC
53
``` The cons of __ are cost may be too expensive for companies to adopt security technology is not free from risk ```
NFC
54
``` uses and embedded chip and antenna to transmit and recieve data via radio waves Technology is used to track vehicles airline passenger baggage pets also in credit cards ```
RFID
55
``` The pros of _ are Operates under a global standard (maintained and updated regularly) -improved efficiency and security Scanning -scan multiple items -No line-of-sight limitations Speed -scan in milliseconds ```
RFID
56
The cons of _ are scanning issues -may have difficulty scanning through items such as metal -can result in tag collision with too many items Security -privacy concerns -side-channel attacks
RFID
57
RFID
Radio Frequency Identification
58
are common communication protocol found in smart home devices and other IoT devices Open standard ideal for low-data rate and low-power application based on IEEE 802.15 specification Operates on 2.4 GHz, 900 MHz, and 868 MHz frequencies Enables implementations from different manufacturers to work together
Zigbee
59
``` _ is a wireless communications protocol uses a mesh networking topology found in smart homes Products include lighting controls security systems thermostats window locks ```
Z-Wave
60
introduced faster data-transmission speeds compared to 1G and 2G Enabled Internett access and video calling for mobile phones (was very low quality) Estimated maximum speed of around 2 Mbps
3G
61
``` supports mobile web acess that also includes gaming services HD mobile tv video conferencing Most current cell phones support it ```
4G
62
LTE
Long Term Evolution
63
``` replaced previous 4G networks benefits higher bandwidth faster connection speeds -VoIP -Multimedia streaming ```
LTE
64
is the latest iteration of cellular technology Offers improved speed and responsiveness -data transfer rates as high as 20 Gbps -1 ms or lower latency
5G
65
__ GHz is generally able to carry farther than 5 GHz
2.4
66
802.11a operates over the _ GHz frequency
5
67
The 2.4 GHz band is divided up into _ channels when using bluetooths devices
79
68
is a client/server model Delivers web-based content over Hypertext Transfer Protocol (HTTP) Eg. web servers include Apache (open source platform that runs on UNIX or LINUX) Internet Information Server (IIS) (Microsoft Proprietary Platform) NGINX (open source and runs on about any operating system)
Web Server
69
are a client/server model Responsible for the central storage and management of data files Files can be accessed by computers on the same network
File Servers
70
The two types of files servers are
dedicated and non-dedicated
71
servers provide faster data access Offer more storage capacity -Typically used for enterprise applications eg. network attached storage (NAS)
Dedicated
72
server is any computer on the network that hosts shared files A file server that provides other services
Non-dedicated
73
servers are used to manage print requests and provide clients with printer queue status information Commonly used in both -Large enterprise networks single dedicated computer that can manage hundreds of printers -Small or home networks Dedicated system hosts the printer Network device (SOHO routers)
Print
74
``` The pros of _ servers are easy to add client systems and printers No restrictions eg. can add unlimited client systems Administration eg. easily manage print queues ```
print
75
The cons of _ servers lack of support for multifunction printers Users may not be able to confirm print status Port compatibility issues and limitations
print
76
servers are used to automatically provide and assign IP addresses and other networking information Relies on the DHCP to respond to clients queries
DHCP
77
In the DHCP discovery process, _ is used by client to locate available DHCP servers
Discover
78
In the DHCP Discovery Process _ informs client that service and configuration is available
Offer
79
In the DHCP discovery process, _ is used to request network configuration data, including an IP address
request
80
In the DHCP discovery process, _ is networking configuration data is sent to client
ACK
81
scopes are what you configure on the server they represent a valid range of IP addresses that are available for assignment Configured on the DHCP server to specify the available IP addresses that can be allocated to clients Configure scope to allow or deny clients from IP addresses -Filter based on name MAC address Operating system
DHCP
82
servers maintain a directory of domain names Names are translated to their corresponding IP address Domain names are much easier to remember than an IP address Similar to a phonebook, a central registry is used to gather information from all servers across teh internet Internet service providers regularly get updated DNS information from registry
DNS
83
In DNS records, Address mapping record (A) specifies the _ address for a given host
IP
84
In DNS records, IP Version 6 address record (AAAA) specifies an _ address for a given host
IPv6
85
In DNS records, Canonical Name records (CNAME) maps one _ name to another
domain
86
In DNS Records __ specifies mail exchange server for DNM domain name Used by SMTP protocol to route email
Mail exchanger record (MX)
87
In DNS Records, __ specifies an authoritative name server
Name Server records (NS)
88
In DNS Records, __ is used to look up domain names based on an IP address
Reverse Lookup Pointer records (PTR)
89
AFP uses port
548
90
servers are systems that will access some other server, usually an internet website, but on behalf of a client. It enables caching, filtering, and security.
Proxy
91
Proxy servers can also be _ servers which means any user can submit a request through the proxy server The proxy server can go out on the internet or intranet to the origin servers where the content resides and retrieve whatever content was requested. The content engine hangs on to the data so that if another user requests the exact same site then that content resides on the proxy server and it does not have to go out on the internet at all. This results in greater security and much greater performance because the site requested by the second user comes back essentially at LAN speeds not at internet speeds
caching
92
_ caching device just caches content. It does no do filtering or anything else Typically have larger caches
Dedicated
93
_ servers can also perform content filtering The can examine the content and determine which content is good and which content is bad All HTTP request go through it so it so it might be the only device allowed to connect to the firewall This means that clients cannot directly connect to external networks or the internet Everything has to go through the it, it makes a single point of filtering and security Certain domains can be filtered out like social media sites while people are at work
Proxy
94
_ servers are responsible for sending and recieving e-mail on behalf of clients
Mail
95
Types of _ server applications include exchange, exim, and sendmail
mail
96
is the process of determining that someone or something is true, genuine, or valid (prove to me that you are who you claim to be or that this is what it claims to be) systems may be as simple as requiring username and password Oters may require additional security information such as security token biometric verification smart card
Authentication
97
_ server is used to facilitate authentication of an entity attempting to access a network
Authentication
98
``` The types of _ server are dedicated server ethernet switch access point network access server ```
authentication
99
_ enables network devices to send event messages to a central logging server eg. network appliances may send event information via messages to be logged on the server Most network devices can send messages such as routers or switches Windows-based servers do not support it natively -require a third party tool to collect information to be forwarded to the server
Syslog
100
``` _ servers components include Syslog lister -used to gather syslog data send over UDP port 515 Database -stores syslog data for quick retrieval Management software -filter and view important log messages -Generate alerts and notifications ```
Syslog